Show plain JSON{"affected_release": [{"advisory": "RHSA-2024:8727", "cpe": "cpe:/o:redhat:rhel_els:7", "package": "firefox-0:128.4.0-1.el7_9", "product_name": "Red Hat Enterprise Linux 7 Extended Lifecycle Support", "release_date": "2024-10-31T00:00:00Z"}, {"advisory": "RHSA-2024:8729", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "firefox-0:128.4.0-1.el8_10", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2024-10-31T00:00:00Z"}, {"advisory": "RHSA-2024:8790", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "thunderbird-0:128.4.0-1.el8_10", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2024-11-04T00:00:00Z"}, {"advisory": "RHSA-2024:8724", "cpe": "cpe:/a:redhat:rhel_aus:8.2", "package": "firefox-0:128.4.0-1.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Advanced Update Support", "release_date": "2024-10-31T00:00:00Z"}, {"advisory": "RHSA-2024:9016", "cpe": "cpe:/a:redhat:rhel_aus:8.2", "package": "thunderbird-0:128.4.0-1.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Advanced Update Support", "release_date": "2024-11-07T00:00:00Z"}, {"advisory": "RHSA-2024:8723", "cpe": "cpe:/a:redhat:rhel_aus:8.4", "package": "firefox-0:128.4.0-1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support", "release_date": "2024-10-31T00:00:00Z"}, {"advisory": "RHSA-2024:9015", "cpe": "cpe:/a:redhat:rhel_aus:8.4", "package": "thunderbird-0:128.4.0-1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support", "release_date": "2024-11-07T00:00:00Z"}, {"advisory": "RHSA-2024:8723", "cpe": "cpe:/a:redhat:rhel_tus:8.4", "package": "firefox-0:128.4.0-1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Telecommunications Update Service", "release_date": "2024-10-31T00:00:00Z"}, {"advisory": "RHSA-2024:9015", "cpe": "cpe:/a:redhat:rhel_tus:8.4", "package": "thunderbird-0:128.4.0-1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Telecommunications Update Service", "release_date": "2024-11-07T00:00:00Z"}, {"advisory": "RHSA-2024:8723", "cpe": "cpe:/a:redhat:rhel_e4s:8.4", "package": "firefox-0:128.4.0-1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions", "release_date": "2024-10-31T00:00:00Z"}, {"advisory": "RHSA-2024:9015", "cpe": "cpe:/a:redhat:rhel_e4s:8.4", "package": "thunderbird-0:128.4.0-1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions", "release_date": "2024-11-07T00:00:00Z"}, {"advisory": "RHSA-2024:8725", "cpe": "cpe:/a:redhat:rhel_aus:8.6", "package": "firefox-0:128.4.0-1.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support", "release_date": "2024-10-31T00:00:00Z"}, {"advisory": "RHSA-2024:9017", "cpe": "cpe:/a:redhat:rhel_aus:8.6", "package": "thunderbird-0:128.4.0-1.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support", "release_date": "2024-11-07T00:00:00Z"}, {"advisory": "RHSA-2024:8725", "cpe": "cpe:/a:redhat:rhel_tus:8.6", "package": "firefox-0:128.4.0-1.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Telecommunications Update Service", "release_date": "2024-10-31T00:00:00Z"}, {"advisory": "RHSA-2024:9017", "cpe": "cpe:/a:redhat:rhel_tus:8.6", "package": "thunderbird-0:128.4.0-1.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Telecommunications Update Service", "release_date": "2024-11-07T00:00:00Z"}, {"advisory": "RHSA-2024:8725", "cpe": "cpe:/a:redhat:rhel_e4s:8.6", "package": "firefox-0:128.4.0-1.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions", "release_date": "2024-10-31T00:00:00Z"}, {"advisory": "RHSA-2024:9017", "cpe": "cpe:/a:redhat:rhel_e4s:8.6", "package": "thunderbird-0:128.4.0-1.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions", "release_date": "2024-11-07T00:00:00Z"}, {"advisory": "RHSA-2024:8722", "cpe": "cpe:/a:redhat:rhel_eus:8.8", "package": "firefox-0:128.4.0-1.el8_8", "product_name": "Red Hat Enterprise Linux 8.8 Extended Update Support", "release_date": "2024-10-31T00:00:00Z"}, {"advisory": "RHSA-2024:9018", "cpe": "cpe:/a:redhat:rhel_eus:8.8", "package": "thunderbird-0:128.4.0-1.el8_8", "product_name": "Red Hat Enterprise Linux 8.8 Extended Update Support", "release_date": "2024-11-07T00:00:00Z"}, {"advisory": "RHSA-2024:8726", "cpe": "cpe:/a:redhat:enterprise_linux:9", "package": "firefox-0:128.4.0-1.el9_4", "product_name": "Red Hat Enterprise Linux 9", "release_date": "2024-10-31T00:00:00Z"}, {"advisory": "RHSA-2024:8793", "cpe": "cpe:/a:redhat:enterprise_linux:9", "package": "thunderbird-0:128.4.0-1.el9_4", "product_name": "Red Hat Enterprise Linux 9", "release_date": "2024-11-04T00:00:00Z"}, {"advisory": "RHSA-2024:9552", "cpe": "cpe:/a:redhat:enterprise_linux:9", "package": "thunderbird-0:128.4.0-1.el9_5", "product_name": "Red Hat Enterprise Linux 9", "release_date": "2024-11-13T00:00:00Z"}, {"advisory": "RHSA-2024:9554", "cpe": "cpe:/a:redhat:enterprise_linux:9", "package": "firefox-0:128.4.0-1.el9_5", "product_name": "Red Hat Enterprise Linux 9", "release_date": "2024-11-13T00:00:00Z"}, {"advisory": "RHSA-2024:8721", "cpe": "cpe:/a:redhat:rhel_e4s:9.0", "package": "firefox-0:128.4.0-1.el9_0", "product_name": "Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions", "release_date": "2024-10-31T00:00:00Z"}, {"advisory": "RHSA-2024:9019", "cpe": "cpe:/a:redhat:rhel_e4s:9.0", "package": "thunderbird-0:128.4.0-1.el9_0", "product_name": "Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions", "release_date": "2024-11-07T00:00:00Z"}, {"advisory": "RHSA-2024:8720", "cpe": "cpe:/a:redhat:rhel_eus:9.2", "package": "firefox-0:128.4.0-1.el9_2", "product_name": "Red Hat Enterprise Linux 9.2 Extended Update Support", "release_date": "2024-10-31T00:00:00Z"}, {"advisory": "RHSA-2024:8728", "cpe": "cpe:/a:redhat:rhel_eus:9.2", "package": "thunderbird-0:128.4.0-1.el9_2", "product_name": "Red Hat Enterprise Linux 9.2 Extended Update Support", "release_date": "2024-10-31T00:00:00Z"}], "bugzilla": {"description": "firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser", "id": "2322424", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322424"}, "csaw": false, "cvss3": {"cvss3_base_score": "6.5", "cvss3_scoring_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "status": "verified"}, "cwe": "CWE-799", "details": ["Repeated writes to history interface attributes could have been used to cause a Denial of Service condition in the browser. This was addressed by introducing rate-limiting to this API. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132.", "The Mozilla Foundation's Security Advisory: Repeated writes to history interface attributes could be used to cause a Denial of Service condition in the browser. This issue was addressed by introducing rate-limiting to this API."], "name": "CVE-2024-10464", "package_state": [{"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Out of support scope", "package_name": "firefox", "product_name": "Red Hat Enterprise Linux 6"}, {"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Out of support scope", "package_name": "thunderbird", "product_name": "Red Hat Enterprise Linux 6"}, {"cpe": "cpe:/o:redhat:enterprise_linux:7", "fix_state": "Out of support scope", "package_name": "thunderbird", "product_name": "Red Hat Enterprise Linux 7"}, {"cpe": "cpe:/o:redhat:enterprise_linux:9", "fix_state": "Affected", "package_name": "firefox-flatpak-container", "product_name": "Red Hat Enterprise Linux 9"}, {"cpe": "cpe:/o:redhat:enterprise_linux:9", "fix_state": "Affected", "package_name": "thunderbird-flatpak-container", "product_name": "Red Hat Enterprise Linux 9"}], "public_date": "2024-10-29T12:19:14Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2024-10464\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-10464\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1913000\nhttps://www.mozilla.org/security/advisories/mfsa2024-55/\nhttps://www.mozilla.org/security/advisories/mfsa2024-56/\nhttps://www.mozilla.org/security/advisories/mfsa2024-58/\nhttps://www.mozilla.org/security/advisories/mfsa2024-59/"], "statement": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.", "threat_severity": "Low"}